Help Net Security
Man sentenced to 82 months for malware
A New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in …
Growing focus on endpoint security
90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …
Nessus 4.4.1 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Malware family integration across botnets
Analysis by Symantec reveals that in February, 1 in 290.1 emails (0.345%) was malicious making February among the most prolific time periods both in terms of simultaneous …
Myvue.com and Autotrader.co.uk infected with malvertising
Taking advantage of the fact that a lot of security companies are more relaxed over the weekend, cybercriminals use the opportunity to strike. This weekend, the popular auto …
Attackers take advantage of emerging technologies
Attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems, according to Zscaler. Q4 saw shifts in the sources of …
Intel completes McAfee acquisition
Intel announced the acquisition of McAfee is complete. McAfee will continue developing and selling security products and services under its own brand. Intel and McAfee plan to …
Do I need a data center?
If you still own your own data center and this question has not already crossed your mind, then you might be spending more money than you need, subjecting your organization to …
Eating the US EMV elephant
Last week, Visa announced that it would eliminate the requirement for eligible merchants to annually validate their compliance with the PCI DSS for any year in which at least …
Toshiba e-Studio855SE series with advanced security features
Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …
Cisco Firewall Services Module DoS vulnerability
A vulnerability exists in the Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that may cause the Cisco FWSM to …
Control physical and virtual machines on a network
Shavlik Technologies announced solutions that provide an approach to controlling all physical and virtual machines on a network. The company introduced NetChk Protect 7.8 and …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)